Home Cisco CVE-2026-20129
Back to Cisco

CVE-2026-20129

Catalyst SD-WAN Manager - API

Cisco CVSS 9.8 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. This vulnerability is due to improper authentication for requests sent to the API and can be exploited by sending a crafted request to the API of an affected system."

Operational Audit Arsenal

Target Type Firmware
Target Asset Cisco Catalyst SD-WAN Manager
Standard Path https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to network services during upgrade

Internal Work Notes

CVE-2026-20129: Unauthenticated access vulnerability in Cisco Catalyst SD-WAN Manager API, requiring urgent patching to prevent potential netadmin role exploitation.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.